Network security refers to measures to protect a computer network from intrusions, attacks, and other malicious activities. These measures generally focus on ensuring the CIA triad: Confidentiality, Integrity, and Availability of data. This presentation dives into the different types of systems used to detect and prevent network intrusions.
This course is a part of IT Audit Bytes series. The other Segments of this series are:
- IT Audit Bytes - Access Control
- IT Audit Bytes - Backup and Recovery
- IT Audit Bytes - Change Management
- IT Audit Bytes - Cybersecurity
- IT Audit Bytes - Data Loss Prevention
- IT Audit Bytes - Disaster Recovery and BCP
- IT Audit Bytes - IT Control Frameworks
- IT Audit Bytes - Job Monitoring
- IT Audit Bytes - Logging and SEIM
- IT Audit Bytes - Network Security and Detection
- IT Audit Bytes - Password Management
- IT Audit Bytes - Physical Security
- IT Audit Bytes - Provisioning and Deprovisioning
- IT Audit Bytes - SDLC Controls
- IT Audit Bytes - Security Awareness Training
- IT Audit Bytes - Separation of Duties Controls
- IT Audit Bytes - SOC Reports
- IT Audit Bytes - Strategy and Governance
- IT Audit Bytes - Third-Party IT Risk Management (TPRM)
Learning Objectives
- Explore and contrast Intrusion Detection and Intrusion Prevention Systems.
- Identify and list types of Intrusion Detection Systems.
- Discover and describe best practices in Intrusion Detection and Intrusion Prevention Systems.
Last updated/reviewed: February 10, 2025
Prerequisites
Course Complexity: Foundational
No advanced preparation or prerequisites are required for this course.
No advanced preparation or prerequisites are required for this course.
Education Provider Information
Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA
95113
Contact:
For more information regarding this course, including complaint and
cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to
.

Toby DeRocheMBA, CIA, CCSA, CRMA, CFE, CISA, CICA, SA, cAAP